A method of automatically tracking a certificate pedigree is provided, in which a new user is provided with a piece of hardware containing a predetermined pedigree certificate stored therein, the predetermined pedigree certificate having a level of trust bearing a relationship to a category of hardware of which the provided piece of hardware is a member. An automated registration arrangement is provided which can be accessed only by users having a piece of hardware containing a predetermined pedigree certificate having a specified level of trust stored therein. When the new user accesses the automated registration arrangement using the provided piece of hardware, the automated registration arrangement provides the new user with an individual signature certificate having a level of trust commensurate with that of the pedigree certificate. The automated registration arrangement flags the new user's individual signature certificate with the level of trust of the pedigree certificate in an appropriate storage area, including the certificate itself.
|
10. An apparatus for automatically tracking a certificate pedigree comprising:
a piece of hardware containing a predetermined pedigree certificate stored therein, the predetermined pedigree certificate having a level of trust commensurate with a category of hardware of which the provided piece of hardware is a member;
an automated registration arrangement which can only be accessed by users having a piece of hardware containing a predetermined pedigree certificate having a specified level of trust stored therein;
a private key associated with the predetermined pedigree certificate, the private key being operative to sign a certificate request to provide the new user with an individual signature certificate;
wherein, upon a new user accessing the automated registration arrangement using the piece of hardware, the automated registration arrangement provides the new user with the individual signature certificate having a level of trust commensurate with that of the pedigree certificate and wherein the automated registration arrangement flags the new user's individual signature certificate with the level of trust of the pedigree certificate in an appropriate storage area.
1. A method of automatically tracking a certificate pedigree comprising:
providing a new user with a piece of hardware containing a predetermined pedigree certificate stored therein, the predetermined pedigree certificate having a level of trust commensurate with a category of hardware of which the provided piece of hardware is a member;
providing an automated registration arrangement which can only be accessed by users having a piece of hardware containing a predetermined pedigree certificate having a specified level of trust stored therein;
signing a certificate request by the provided piece of hardware using a private key associated with the predetermined pedigree certificate to provide the new user with the individual signature certificate; and
providing the new user with an individual signature certificate from the automated registration arrangement upon the new user accessing the automated registration arrangement using the provided piece of hardware, the individual signature certificate having a level of trust commensurate with that of the pedigree certificate and wherein the automated registration arrangement flags the new user's individual signature certificate with the level of trust of the pedigree certificate in an appropriate storage area.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
11. The apparatus of
12. The apparatus of
13. The apparatus of
14. The apparatus of
15. The apparatus of
16. The apparatus of
17. The apparatus of
18. The apparatus of
|
This application claims the benefit of U.S. Provisional Appn. No. 60/210,466, filed Jun. 9, 2000, and Provisional Appn. No. 60/229,336, filed Sep. 1, 2000, the contents of which are expressly incorporated by reference herein.
1. Field of the Invention
The present invention relates to digital certificates in a PKI (Public Key Infrastructure). More particularly, the present invention relates to the automated tracking of a certificate pedigree of digital certificates in a PKI to enable a determination as to the trustworthiness of a digital certificate.
2. Description of the Related Art
A PKI is a set of policies, procedures, and software that permit an organization to generate, issue, and manage public/private cryptographic keys in a manner that allows users to reliably determine the identity of the owner of each public/private key pair. The key components of a PKI include: (1) a mechanism for reliably conveying the identity of a key pair's owner to the end user; (2) software applications for generating and managing key pairs that support this mechanism; (3) a set of procedures for generating and revoking key pairs that ensures that the identity of the owner can be reliably determined; and (4) a set of policies defining who may obtain public/private key pairs and identifying how each pair may be used.
As to component (1) of a PKI, most PKIs establish that the user owns a key pair by using an electronic document called a digital certificate. Digital certificates contain information identifying the owner of the key pair, the public component of the pair, and the period of time for which the certificate is valid. The digital certificate also identifies technical information about the key itself, such as the algorithm used to generate the key and the key length.
Certificates are generated by organizations that are responsible for verifying the identity of individuals, or in some instances, other organizations to which certificates are being issued. The identity of the certifying organization, referred to as a certificate authority, is recorded in each certificate, which is then signed using a private key known only to the certificate authority itself. This allows users to verify both the integrity of the certificate and the identity of the authority that issued it.
Certificate authorities generally employ any of a number of different commercially available software products to manage the creation, renewal, and revocation of certificates. These Certificate Management Systems (CMS) take information obtained through the user registration process, create a certificate, and sign it with the certificate authority's private key. The applicable CMS software maintains a database of all of the certificates that it has issued, and their statuses. The CMS is also responsible for revoking certificates, and for publishing a certificate revocation list that identifies the date on which each certificate was revoked, and the reason for the revocation. This information allows relying users (that is, those individuals or systems that are performing encryption or signature verification actions based on certificates) to review the status of a certificate, to assess its usability. A list of distribution points from which the CRL can be obtained are identified in the certificate itself.
In issuing a certificate, a certificate authority is stating that is has verified that the public key that appears in the certificate (and, by extension, the corresponding private key) belongs to the individual listed in the certificate. The integrity with which the registration process operates is therefore of great importance. The process must provide mechanisms for reliably identifying an individual and for verifying that the public key listed in the certificate belongs to that individual. Equally important, the certificate authority must provide procedures for revoking certificates in the event that the private key is compromised. A compromised private key calls into question the entire basis for trusting a certificate, since more than one individual may be using that private key to sign documents, or more than one individual may be able to decrypt documents encrypted using the corresponding public key.
Relying individuals and organizations must have a clear understanding of their certificate authority's operation processes. As a result, most certificate authorities publish a Certificate Practice Statement (CPS) that details the processes for registering users, issuing certificates, renewing certificates and revoking certificates. The CPS is normally published on the certificate authority's website.
Certificates often contain additional information that identifies an individual as a member of a particular organization and perhaps the role that they play in the organization. For example, the certificate may identify the certificate holder as being an employee of a company or a customer or subcontractor or supplier of the company. The policies determining who is eligible to hold a certificate are therefore important if individuals and organizations are to rely upon this information. These policies govern the overall operation of the certificate authority.
The policies under which users register for certificates determine the initial degree of trust that a relying party should place in a certificate. However, the manner in which the public key associated with the certificate is protected is equally as important. Private keys may be stored in any of several different ways. They may be placed on password protected public storage media, such as directories or databases. They may also be stored on password protected media accessible only to the certificate holder or to a relatively small number of persons, such as a floppy disk, the hard drive of the certificate holder's personal computer, or a portable storage device such as a smart card. A more secure storage medium is provided by hardware tokens containing encryption “engines.” These hardware tokens actually generate and store the private key and perform all encryption/decryption functions within the token. Hardware tokens typically require a password to activate and, since they remain in the possession of the certificate holder at all times, are substantially more secure than other storage media.
In a manual registration process, a human registration agent may ascertain the nature, or “pedigree,” of the storage media on which the certificate and its corresponding private key are stored. When the process of issuing a digital certificate is automated, there is no way of keeping track of the “pedigree” of the certificate which was generated. That is, was the certificate originally generated on a client PC or on a smart card or on a hardware token? The different categories of hardware computing devices are all capable of generating digital certificates which, from a software standard, are identical in format and content.
The pedigree of the digital certificate can have a significant bearing on the business functions to which that certificate is applied. That is, a certificate generated on a client PC will typically be less trustworthy than a certificate generated on a hardware token in that hardware tokens are typically more difficult for hackers to compromise than conventional PCs and hence certificates generated by such tokens have a higher level of trust. Accordingly, unless the PKI can keep track of the pedigree of the certificate, one may not know what level of trust to place on business functions associated with that certificate.
Unfortunately, earlier PKI registration processes provide no automated mechanism for tracking the pedigree of a certificate, that is, they provide no mechanism for keeping track of what kind of hardware was used to generate the private/public key pair. In cases where pedigree checking has been required, the tracking was performed manually. Manual tracking is expensive and time-consuming.
In accordance with the present invention, a new category of certificate, called a “pedigree certificate” is created. A single pedigree certificate may be shared in common among all elements of a given category of hardware. For example, all smart cards having identical security properties will be loaded with a common pedigree certificate and its associated private key. This pedigree certificate will be loaded only onto these smart cards, and will be used for no other purpose.
In accordance with the present invention, specific categories of hardware, such as smart cards or USB (Universal Serial Bus) tokens, are pre-loaded with a pedigree certificate and associated private key designating the hardware type, one pedigree certificate being designed for each category of hardware.
In accordance with the present invention, an automated registration arrangement, such as special Registration Web pages on the Internet, can be accessed only via the associated pedigree certificate, one Web page for each pedigree certificate, for example. Accordingly, if a user accesses one of the special Registration Web pages, the user must be employing the special hardware of the corresponding category since only that category of hardware possesses the requisite pedigree certificate and associated private key. Thus, the user can be issued a digital certificate having a level of trust commensurate with the pedigree certificate of the special hardware of the user.
The foregoing and a better understanding of the present invention will become apparent from the following detailed description of example embodiments and the claims when read in connection with the accompanying drawings, all forming a part of the disclosure of this invention. While the foregoing and following written and illustrated disclosure focuses on disclosing example embodiments of the invention, it should be clearly understood that the same is by way of illustration and example only and the invention is not limited thereto. The spirit and scope of the present invention are limited only by the terms of the appended claims.
The following represents brief descriptions of the drawings, wherein:
Before beginning a detailed description of the subject invention, mention of the following is in order. When appropriate, like reference numerals and characters may be used to designate identical, corresponding, or similar components in differing drawing figures. Furthermore, in the detailed description to follow, example sizes/models/values/ranges may be given, although the present invention is not limited thereto. Lastly, well-known components and connections have not been shown within the drawing figures for simplicity of illustration and discussion and so as not to obscure the invention.
In step 1 of
In step 0a of
In step 8 of
In step 9, the personal registration authority 146 delivers registration information to the new user 132 in a face-to-face meeting. In step 10a, the new user 132 revisits the special registration Web page 350 and can forward the requisite registration information. The special registration of the Web page 350 can only be accessed by using a hardware token 130 that has been pre-loaded with the requisite pedigree certificate and associated private key (from step 0a). In step 11a, the registration Web server 124 signals the registration authority 112 to register the new user 132 possessing the hardware token 130 and in step 12a, the registration authority 112 signals the client platform 128 to generate a private/public key pair on the hardware token 130. Before the public key is sent to the certificate authority, the token can sign the certificate request before the certificate leaves the token, using the private key. This allows the certification authority to know that the pedigree is valid for the highest level of assurance in the reliability of the key storage mechanism. In step 13, the public key is sent from the client platform 128 to the certificate authority 110, which records the certificate pedigree as a certificate policy object identifier (OID) in the certificate itself. Before signing the certificate, the certification authority validates that the certificate request was signed by the token itself. This makes any Trojan horse attack impossible because only a valid token, with the valid private key for a specific pedigree could have signed the request. In step 14, the certificate authority 110 sends the signed certificate (with public key) to the directory 108. In step 15a, the registration Web server 124 alerts the directory 108 that this certificate was generated on the hardware token 130. The Web server 124 knows this because of the fact that only a user 132 having a hardware token 130 would have been able to access the special version of the registration Web page 350.
Thus, if there are one or more categories of computing devices which are able to generate digital certificates and if one wishes to track which certificates in an enterprise were generated by a given category of devices, then in accordance with the present invention, a pedigree certificate is assigned to each category of device for certificates which are to be tracked and these pedigree certificates are pre-loaded in those devices. An automated registration process is provided which allows access only by individuals possessing that pedigree certificate. The process is configured so that individual certificates can be generated and so that it can record those instances in which a given individual certificate was generated using this process. The recording can occur inside a database, a directory, or any other persistent data storage area, and is also labeled as a certificate policy OID in the certificate itself.
As a concrete example, assume that Alice Jones wishes to use an automated PKI registration process to generate her signature certificate. Alice obtains a hardware token from her employer that has been factory pre-loaded with a pedigree certificate called “Level 3 Trust.” Alice uses the hardware token to access the automated PKI registration process. If Alice were not able to present the “Level 3 Trust” certificate to the PKI registration process, the registration process would deny her attempt to generate an individual signature certificate. However, since Alice does have the requisite “Level 3 Trust” pedigree certificate, the PKI registration process consents to her request and more importantly, the PKI registration process knows that Alice must have used a hardware token to access the process. Accordingly, the PKI registration process can flag Alice's individual certificate as being a “Level 3” certificate in associated databases and directories. In other words, the pedigree of Alice's certificate has been successfully tracked automatically without requiring special intervention from another person. Furthermore, each certificate request must be specifically signed by the private key associated with the trust level of the certificate. This approach moves the “trust boundary” from the uncontrolled user computer to the controlled token itself.
An advantage of the present invention is that it allows existing commercial products and network standards to accomplish a new kind of functionality, that is, the automated tracking of the pedigree of an individual certificate. As a consequence thereof, PKI systems that are highly automated can now enjoy a feature that was previously only available with manually intensive PKI systems. Thus, the use of this invention yields a significant cost saving when applied to both existing and future PKI system architectures.
This concludes the description of the example embodiments. Although the present invention has been described with reference to illustrative embodiments thereof, it should be understood that numerous other modifications and embodiments can be devised by those skilled in the art that will fall within the spirit and scope of the principles of this invention. More particularly, reasonable variations and modifications are possible in the component parts and/or arrangements of the subject combination arrangement within the scope of the foregoing disclosure, the drawings, and the appended claims without departing from the spirit of the invention. In addition to variations and modifications in the component parts and/or arrangements, alternative uses will also be apparent to those skilled in the art.
Aull, Kenneth W., McCullough, Vincent J.
Patent | Priority | Assignee | Title |
7313689, | Apr 07 2003 | International Business Machines Corporation | Method, system and service for the authentication of a public key certificate |
7451308, | Oct 12 2004 | SAP SE | Method and system to automatically evaluate a participant in a trust management infrastructure |
7489645, | Dec 17 2003 | Microsoft Technology Licensing, LLC | Mesh networks with end device recognition |
7665126, | Dec 17 2003 | Microsoft Technology Licensing, LLC | Mesh networks with exclusion capability |
7747852, | Sep 01 2000 | Northrop Grumman Systems Corporation | Chain of trust processing |
7975139, | May 01 2001 | ONESPAN NORTH AMERICA INC | Use and generation of a session key in a secure socket layer connection |
8028333, | Apr 07 2003 | International Business Machines Corporation | Method and system for the authentication of a public key certificate |
8090939, | Oct 21 2005 | Hewlett-Packard Development Company, L.P. | Digital certificate that indicates a parameter of an associated cryptographic token |
8234490, | Jun 27 2007 | GLOBALSIGN K K | Server certificate issuing system |
8392702, | Jul 27 2007 | Google Technology Holdings LLC | Token-based management system for PKI personalization process |
8683196, | Nov 24 2009 | Red Hat, Inc; Red Hat, Inc. | Token renewal |
8738901, | Nov 24 2009 | Red Hat, Inc.; Red Hat, Inc | Automatic certificate renewal |
9130758, | Nov 10 2009 | Red Hat, Inc.; Red Hat, Inc | Renewal of expired certificates |
9215232, | Nov 24 2009 | Red Hat, Inc. | Certificate renewal |
Patent | Priority | Assignee | Title |
5311591, | May 15 1992 | RPX Corporation | Computer system security method and apparatus for creating and using program authorization information data structures |
5539828, | May 31 1994 | Intel Corporation | Apparatus and method for providing secured communications |
5721781, | Sep 13 1995 | Microsoft Technology Licensing, LLC | Authentication system and method for smart card transactions |
5781723, | Jun 03 1996 | Microsoft Technology Licensing, LLC | System and method for self-identifying a portable information device to a computing unit |
6134593, | Sep 30 1997 | CCCOMPLETE, INC | Automated method for electronic software distribution |
6308273, | Jun 12 1998 | Microsoft Technology Licensing, LLC | Method and system of security location discrimination |
6367011, | Oct 14 1997 | Visa International Service Association | Personalization of smart cards |
6516416, | Jun 11 1997 | PRISM TECHNOLOGIES, L L C | Subscription access system for use with an untrusted network |
6609198, | Aug 05 1999 | Oracle America, Inc | Log-on service providing credential level change without loss of session continuity |
JP1125045, | |||
WO4673, | |||
WO54125, | |||
WO200004673, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Oct 16 2000 | Northrop Grumman Corporation | (assignment on the face of the patent) | / | |||
Jan 19 2001 | AULL, KENNETH W | TRW Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011572 | /0890 | |
Jan 19 2001 | MCCULLOUGH, VINCENT J | TRW Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011572 | /0890 | |
Jan 22 2003 | TRW, INC N K A NORTHROP GRUMMAN SPACE AND MISSION SYSTEMS CORPORATION, AN OHIO CORPORATION | Northrop Grumman Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 013751 | /0849 | |
Nov 25 2009 | NORTHROP GRUMMAN CORPORTION | NORTHROP GRUMMAN SPACE & MISSION SYSTEMS CORP | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023699 | /0551 | |
Dec 10 2009 | NORTHROP GRUMMAN SPACE & MISSION SYSTEMS CORP | Northrop Grumman Systems Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023915 | /0446 |
Date | Maintenance Fee Events |
Apr 08 2008 | ASPN: Payor Number Assigned. |
Apr 08 2008 | RMPN: Payer Number De-assigned. |
Nov 13 2009 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Nov 07 2013 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Nov 07 2017 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
May 16 2009 | 4 years fee payment window open |
Nov 16 2009 | 6 months grace period start (w surcharge) |
May 16 2010 | patent expiry (for year 4) |
May 16 2012 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 16 2013 | 8 years fee payment window open |
Nov 16 2013 | 6 months grace period start (w surcharge) |
May 16 2014 | patent expiry (for year 8) |
May 16 2016 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 16 2017 | 12 years fee payment window open |
Nov 16 2017 | 6 months grace period start (w surcharge) |
May 16 2018 | patent expiry (for year 12) |
May 16 2020 | 2 years to revive unintentionally abandoned end. (for year 12) |